Skip to main content

Statistically Validating Intrusion Detection Framework Against Selected DoS Attacks in Ad Hoc Networks: An NS-2 Simulation Study

  • Conference paper
  • First Online:
  • 1010 Accesses

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 410))

Abstract

Network security is a weak link in wired and wireless network systems which if breeched then the functionality of the underlying network is impaired by malicious attacks and causes tremendous loss to the network. The DoS (Denial of Service) attacks are one of the harmful network security threats. Ad Hoc networks can be easily damaged by such attacks as they are infrastructure less and without any centralized authority. This paper narrates results of an undertaken research work to study the consequence of selected DoS attacks on the performance of Ad Hoc networks. The gained knowledge is used to design and develop a security framework to detect intrusion and perform response actions. The validations of proposed defense system are carried out using statistical approach. All Simulations were carried out in NS-2.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Conti, M.: Body, personal and local ad hoc wireless networks. In: The Handbook of Ad Hoc Wireless Networks, Chap. 1. CRC Press LLC (2003)

    Google Scholar 

  2. Ilyas, M.: The Handbook of Ad Hoc Wireless Networks. CRC Press (2003)

    Google Scholar 

  3. Stallings, W.: Wireless Communication and Networks. Pearson Education (2002)

    Google Scholar 

  4. Schiller, J.: Mobile Communication. Addison-Wesley (2000)

    Google Scholar 

  5. Anderson, J.P.: Computer Security Threat Monitoring and Surveillance. James P. Anderson Co., Fort Washington (1980)

    Google Scholar 

  6. Wu et al.: A survey of attacks and countermeasures in mobile ad hoc networks. In: Wireless/mobile network security, vol. 17. Springer (2006)

    Google Scholar 

  7. Virada, V.P.: Intrusion detection system (IDS) for secure MANETs: a study. Int. J. Comput. Eng. Res. (ijceronline.com) 2(6). ISSN 2250-3005(online) October 2012

    Google Scholar 

  8. Zhang, X., Sekiya, Y., Wakahara, Y.: Proposal of a method to detect black hole attack in MANET. In: International Symposium on Autonomous Decentralized Systems (ISADS ‘09), pp. 1–6 (2009)

    Google Scholar 

  9. Al-Shurman, M., Yoo, S.-M., Park, S.: Black hole attack in mobile ad hoc networks. ACM Southeast Regional Conference (2004)

    Google Scholar 

  10. Aad, I., Hubaux, J.-P., Knightly, E.W.: Denial of service resilience in ad hoc networks. In: Proceedings of the 10th Annual International Conference on Mobile Computing and Networking, pp. 202–215 (2004)

    Google Scholar 

  11. Bellardo, J., Savage, S.: 802.11 Denial-of-service attacks: real vulnerabilities and practical solutions. In: Proceedings of the 12th Conference on USENIX Security Symposium, vol. 12

    Google Scholar 

  12. Mistry, N., Jinwala, D.C., Zaveri, M.: Improving AODV protocol against blackhole attacks. In: Proceedings of the International Multi Conference of Engineer and Computer Science, vol. 2 (2010)

    Google Scholar 

  13. Soomro, S.A., Soomro, S.A., Memon, A.G., Baqi, A.: Denial of service attacks in wireless ad hoc networks. J. Inform. Commun. Technol. 4(2), 1–10

    Google Scholar 

  14. Bhardwaj, M., Singh, G.P.: Types of hacking attack and their countermeasure. Int. J. Educ. Plann. Admin. 1(1), 43–53

    Google Scholar 

  15. Atiya Begum, S.: Techniques for resilience of denial of service attacks in mobile ad hoc networks. Int. J. Sci. Eng. Res. 3(3) (2012)

    Google Scholar 

  16. Zhang, Y., Lee, W., Huang, Y.: Intrusion detection techniques for mobile wireless networks. ACM/Kluwer Wireless Networks J. (ACM WINET) 9(5) (2003)

    Google Scholar 

  17. Aad, I., Hubaux, J.P., Knightly, E.W.: Denial of service resilience in ad hoc networks. ACM, MOBICOM, Philadelphia, PA, USA (2004)

    Google Scholar 

  18. Mukherjee, B., Heberlein, L., Levitt, K.: Network intrusion detection. IEEE Network 8(3), 26–41 (1994)

    Google Scholar 

  19. Chan, Y.K., et al.: IDR: an intrusion detection router for defending against distributed denial-of-service (DDoS) attacks. In: Proceedings of the 7th International Symposium on Parallel Architectures, Algorithms and Networks (ISPAN’04), pp. 581–586 (2004)

    Google Scholar 

  20. Buttyán, L., Hubaux, J.P.: Stimulating cooperation in self-organizing mobile ad hoc networks. ACM J. Mobile Networks (MONET) 8(5), 579–592 (2003)

    Article  Google Scholar 

  21. Luo, H., Lu, S.: Ubiquitous and robust authentication services for ad hoc wireless networks. Department of Computer Science, UCLA, Technical Report TR-200030 (2000)

    Google Scholar 

  22. Sun, B., Wu, K., Pooch, U.W.: Alert aggregation in mobile ad hoc networks. In: Proceedings of the 2003 ACM Workshop on Wireless Security (WiSe’03) in Conjunction with the 9th Annual International Conference on Mobile Computing and Networking (MobiCom’03), pp. 69–78 (2003)

    Google Scholar 

  23. Raj, P.N., Swadas, P.B.: DPRAODV: a dynamic learning system against blackhole attack in AODV based MANET. Int. J. Comput. Sci. 2, 54–59 (2009)

    Google Scholar 

  24. Tseng, F.H., et al.: A survey of black hole attacks in wireless mobile ad hoc networks. Human-centric Comput. Inform. Sci. 1, 4 (2011). doi:10.1186/2192-1962-1-4

    Google Scholar 

  25. Alampalayam, S.P.: Classification and review of security schemes in mobile computing, wireless sensor networks. 2, 419–440 (2010)

    Google Scholar 

  26. Trost, B.W.: Authenticated ad hoc routing at the link layer for mobile systems. Wireless Networks 7(2), 139–145 (2001)

    Article  MATH  Google Scholar 

  27. Brutch, P., Ko, C.: Challenges in intrusion detection for wireless ad hoc networks. In: Proceedings of Symposium on Applications and the Internet Workshop, pp. 368–373 (2003)

    Google Scholar 

  28. Tseng, C., Balasubramanyam, P.: A specification-based intrusion detection system for AODV, In: Proceedings of ACM Workshop on Security of Ad Hoc and Sensor Networks, pp. 125–134 (2003)

    Google Scholar 

  29. Kachirski, O., Guha, R.: Effective intrusion detection using multiple sensors in wireless ad hoc networks. In: Proceedings of 36th International Conference on System Sciences, pp. 57–64 (2003)

    Google Scholar 

  30. Lou, K.H., Xu, K., Gu, D., Gerla, M., Lu, S.: Adaptive security for multilayer ad hoc networks. Special Issue of Wireless Communication Mobile Comput. 2, 533–547 (2002)

    Google Scholar 

  31. Ye, N., Chen, Q.: An anomaly detection techniques based on a CHI-SQUARE statistics for detecting intrusion into information system. Quality Reliab. Eng. Int. (2001)

    Google Scholar 

  32. Ye, N., Li, X., Emran, M., Xu, M.: Probabilistic techniques for intrusion detection based on computer audit data. IEEE Trans. Syst. Man Cybern. (2001)

    Google Scholar 

  33. Alampalayam, S.P., et al.: Intruder identification and response framework for mobile ad hoc networks. In: Conference Proceedings, Conference: 22nd International Conference on Computers and Their Applications, CATA-2007, Honolulu, Hawaii, USA, March 28–30 (2007)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Sakharam Lokhande .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer India

About this paper

Cite this paper

Lokhande, S., Bhalchandra, P., Khamitkar, S., Deshmukh, N., Mekewad, S., Wasnik, P. (2016). Statistically Validating Intrusion Detection Framework Against Selected DoS Attacks in Ad Hoc Networks: An NS-2 Simulation Study. In: Behera, H., Mohapatra, D. (eds) Computational Intelligence in Data Mining—Volume 1. Advances in Intelligent Systems and Computing, vol 410. Springer, New Delhi. https://doi.org/10.1007/978-81-322-2734-2_41

Download citation

  • DOI: https://doi.org/10.1007/978-81-322-2734-2_41

  • Published:

  • Publisher Name: Springer, New Delhi

  • Print ISBN: 978-81-322-2732-8

  • Online ISBN: 978-81-322-2734-2

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics